Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 20:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f1386cfbfaec37b76233324d09a5413120b930a5d36379291d1240aec4fbf1b1N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
f1386cfbfaec37b76233324d09a5413120b930a5d36379291d1240aec4fbf1b1N.exe
-
Size
54KB
-
MD5
d8490520b24f1e96ae3ca8df5ef552c0
-
SHA1
99acdb5d70ecdf283a8231459165e3a0c11f35b9
-
SHA256
f1386cfbfaec37b76233324d09a5413120b930a5d36379291d1240aec4fbf1b1
-
SHA512
78d77f43d6079744c89dc1388eabf74d415f432e32827bc96d58ec231982d99c75dd1f44c607f3a70cf89dd9e13564693ae0ec2eb143a48d88309b07e806cf9b
-
SSDEEP
1536:mAocdpeVoBDulhzHMb7xNAa04Mcg5IKvlNJL:0cdpeeBSHHMHLf9RyIE1
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/628-5-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2520-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2552-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1260-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1912-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3536-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/936-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1388-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/400-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3868-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2664-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1936-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2032-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/864-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4972-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4000-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3460-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3860-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4988-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1604-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1684-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4372-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2448-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2448-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4660-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/916-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3208-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2344-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4508-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2300-209-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2580-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2192-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1028-224-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/900-246-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3536-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3908-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1836-267-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2532-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3060-287-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4944-290-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/464-306-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5012-313-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4872-320-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/184-324-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/452-340-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3968-353-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4900-357-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4832-370-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4216-380-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4968-393-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2364-409-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1168-413-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1828-417-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1464-469-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2744-506-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3300-558-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2316-589-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4532-635-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4460-654-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3128-697-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/208-1001-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4264-1131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/704-1183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2520 q46000.exe 2552 frllrfl.exe 1260 u404666.exe 1912 6888268.exe 3536 8288440.exe 2392 488882.exe 936 lffxllf.exe 1388 nthbtn.exe 400 xlllffx.exe 3868 frrlllf.exe 2664 620844.exe 1936 e04200.exe 2032 k80484.exe 3060 864460.exe 864 7bhntn.exe 4972 ppppj.exe 4616 20042.exe 4000 644248.exe 3460 lrlxxlx.exe 3860 jjpjp.exe 4988 80608.exe 1604 0444844.exe 1684 xlxlfff.exe 4372 nhnttt.exe 536 60882.exe 2448 0800604.exe 4476 04004.exe 2628 48044.exe 4660 7tnhtt.exe 1972 vjpdj.exe 1132 1flfxff.exe 916 dvpvj.exe 3208 6284404.exe 2344 e62044.exe 4332 8088822.exe 4508 g8482.exe 2300 a4004.exe 2580 226600.exe 540 8448660.exe 2192 1tnnhh.exe 3056 2864224.exe 628 s0004.exe 4980 fxflffx.exe 1124 228000.exe 2240 ttnnhb.exe 1260 vjddp.exe 3980 28444.exe 900 446060.exe 3536 xfrrffx.exe 3908 6248448.exe 3148 1nttbn.exe 952 242028.exe 1452 802660.exe 1836 i066482.exe 2104 bbtnbb.exe 1472 w40086.exe 2532 1llfxxx.exe 1488 22462.exe 4728 26482.exe 3060 0404260.exe 4944 rxfrxlr.exe 5088 884426.exe 4972 62260.exe 2284 3djjv.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s2882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0844400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o404826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 044804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 688200.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrxlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0404260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4060482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlfllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 484860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1tnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 088622.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 2520 628 f1386cfbfaec37b76233324d09a5413120b930a5d36379291d1240aec4fbf1b1N.exe 84 PID 628 wrote to memory of 2520 628 f1386cfbfaec37b76233324d09a5413120b930a5d36379291d1240aec4fbf1b1N.exe 84 PID 628 wrote to memory of 2520 628 f1386cfbfaec37b76233324d09a5413120b930a5d36379291d1240aec4fbf1b1N.exe 84 PID 2520 wrote to memory of 2552 2520 q46000.exe 85 PID 2520 wrote to memory of 2552 2520 q46000.exe 85 PID 2520 wrote to memory of 2552 2520 q46000.exe 85 PID 2552 wrote to memory of 1260 2552 frllrfl.exe 86 PID 2552 wrote to memory of 1260 2552 frllrfl.exe 86 PID 2552 wrote to memory of 1260 2552 frllrfl.exe 86 PID 1260 wrote to memory of 1912 1260 u404666.exe 87 PID 1260 wrote to memory of 1912 1260 u404666.exe 87 PID 1260 wrote to memory of 1912 1260 u404666.exe 87 PID 1912 wrote to memory of 3536 1912 6888268.exe 88 PID 1912 wrote to memory of 3536 1912 6888268.exe 88 PID 1912 wrote to memory of 3536 1912 6888268.exe 88 PID 3536 wrote to memory of 2392 3536 8288440.exe 89 PID 3536 wrote to memory of 2392 3536 8288440.exe 89 PID 3536 wrote to memory of 2392 3536 8288440.exe 89 PID 2392 wrote to memory of 936 2392 488882.exe 90 PID 2392 wrote to memory of 936 2392 488882.exe 90 PID 2392 wrote to memory of 936 2392 488882.exe 90 PID 936 wrote to memory of 1388 936 lffxllf.exe 91 PID 936 wrote to memory of 1388 936 lffxllf.exe 91 PID 936 wrote to memory of 1388 936 lffxllf.exe 91 PID 1388 wrote to memory of 400 1388 nthbtn.exe 92 PID 1388 wrote to memory of 400 1388 nthbtn.exe 92 PID 1388 wrote to memory of 400 1388 nthbtn.exe 92 PID 400 wrote to memory of 3868 400 xlllffx.exe 93 PID 400 wrote to memory of 3868 400 xlllffx.exe 93 PID 400 wrote to memory of 3868 400 xlllffx.exe 93 PID 3868 wrote to memory of 2664 3868 frrlllf.exe 94 PID 3868 wrote to memory of 2664 3868 frrlllf.exe 94 PID 3868 wrote to memory of 2664 3868 frrlllf.exe 94 PID 2664 wrote to memory of 1936 2664 620844.exe 95 PID 2664 wrote to memory of 1936 2664 620844.exe 95 PID 2664 wrote to memory of 1936 2664 620844.exe 95 PID 1936 wrote to memory of 2032 1936 e04200.exe 96 PID 1936 wrote to memory of 2032 1936 e04200.exe 96 PID 1936 wrote to memory of 2032 1936 e04200.exe 96 PID 2032 wrote to memory of 3060 2032 k80484.exe 97 PID 2032 wrote to memory of 3060 2032 k80484.exe 97 PID 2032 wrote to memory of 3060 2032 k80484.exe 97 PID 3060 wrote to memory of 864 3060 864460.exe 98 PID 3060 wrote to memory of 864 3060 864460.exe 98 PID 3060 wrote to memory of 864 3060 864460.exe 98 PID 864 wrote to memory of 4972 864 7bhntn.exe 99 PID 864 wrote to memory of 4972 864 7bhntn.exe 99 PID 864 wrote to memory of 4972 864 7bhntn.exe 99 PID 4972 wrote to memory of 4616 4972 ppppj.exe 100 PID 4972 wrote to memory of 4616 4972 ppppj.exe 100 PID 4972 wrote to memory of 4616 4972 ppppj.exe 100 PID 4616 wrote to memory of 4000 4616 20042.exe 101 PID 4616 wrote to memory of 4000 4616 20042.exe 101 PID 4616 wrote to memory of 4000 4616 20042.exe 101 PID 4000 wrote to memory of 3460 4000 644248.exe 102 PID 4000 wrote to memory of 3460 4000 644248.exe 102 PID 4000 wrote to memory of 3460 4000 644248.exe 102 PID 3460 wrote to memory of 3860 3460 lrlxxlx.exe 103 PID 3460 wrote to memory of 3860 3460 lrlxxlx.exe 103 PID 3460 wrote to memory of 3860 3460 lrlxxlx.exe 103 PID 3860 wrote to memory of 4988 3860 jjpjp.exe 104 PID 3860 wrote to memory of 4988 3860 jjpjp.exe 104 PID 3860 wrote to memory of 4988 3860 jjpjp.exe 104 PID 4988 wrote to memory of 1604 4988 80608.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1386cfbfaec37b76233324d09a5413120b930a5d36379291d1240aec4fbf1b1N.exe"C:\Users\Admin\AppData\Local\Temp\f1386cfbfaec37b76233324d09a5413120b930a5d36379291d1240aec4fbf1b1N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:628 -
\??\c:\q46000.exec:\q46000.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
\??\c:\frllrfl.exec:\frllrfl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\u404666.exec:\u404666.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1260 -
\??\c:\6888268.exec:\6888268.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
\??\c:\8288440.exec:\8288440.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
\??\c:\488882.exec:\488882.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\lffxllf.exec:\lffxllf.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:936 -
\??\c:\nthbtn.exec:\nthbtn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
\??\c:\xlllffx.exec:\xlllffx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
\??\c:\frrlllf.exec:\frrlllf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
\??\c:\620844.exec:\620844.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\e04200.exec:\e04200.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
\??\c:\k80484.exec:\k80484.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\864460.exec:\864460.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\7bhntn.exec:\7bhntn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:864 -
\??\c:\ppppj.exec:\ppppj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
\??\c:\20042.exec:\20042.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\644248.exec:\644248.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
\??\c:\lrlxxlx.exec:\lrlxxlx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
\??\c:\jjpjp.exec:\jjpjp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
\??\c:\80608.exec:\80608.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
\??\c:\0444844.exec:\0444844.exe23⤵
- Executes dropped EXE
PID:1604 -
\??\c:\xlxlfff.exec:\xlxlfff.exe24⤵
- Executes dropped EXE
PID:1684 -
\??\c:\nhnttt.exec:\nhnttt.exe25⤵
- Executes dropped EXE
PID:4372 -
\??\c:\60882.exec:\60882.exe26⤵
- Executes dropped EXE
PID:536 -
\??\c:\0800604.exec:\0800604.exe27⤵
- Executes dropped EXE
PID:2448 -
\??\c:\04004.exec:\04004.exe28⤵
- Executes dropped EXE
PID:4476 -
\??\c:\48044.exec:\48044.exe29⤵
- Executes dropped EXE
PID:2628 -
\??\c:\7tnhtt.exec:\7tnhtt.exe30⤵
- Executes dropped EXE
PID:4660 -
\??\c:\vjpdj.exec:\vjpdj.exe31⤵
- Executes dropped EXE
PID:1972 -
\??\c:\1flfxff.exec:\1flfxff.exe32⤵
- Executes dropped EXE
PID:1132 -
\??\c:\dvpvj.exec:\dvpvj.exe33⤵
- Executes dropped EXE
PID:916 -
\??\c:\6284404.exec:\6284404.exe34⤵
- Executes dropped EXE
PID:3208 -
\??\c:\e62044.exec:\e62044.exe35⤵
- Executes dropped EXE
PID:2344 -
\??\c:\8088822.exec:\8088822.exe36⤵
- Executes dropped EXE
PID:4332 -
\??\c:\g8482.exec:\g8482.exe37⤵
- Executes dropped EXE
PID:4508 -
\??\c:\a4004.exec:\a4004.exe38⤵
- Executes dropped EXE
PID:2300 -
\??\c:\226600.exec:\226600.exe39⤵
- Executes dropped EXE
PID:2580 -
\??\c:\8448660.exec:\8448660.exe40⤵
- Executes dropped EXE
PID:540 -
\??\c:\1tnnhh.exec:\1tnnhh.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2192 -
\??\c:\2864224.exec:\2864224.exe42⤵
- Executes dropped EXE
PID:3056 -
\??\c:\flrrllf.exec:\flrrllf.exe43⤵PID:1028
-
\??\c:\s0004.exec:\s0004.exe44⤵
- Executes dropped EXE
PID:628 -
\??\c:\fxflffx.exec:\fxflffx.exe45⤵
- Executes dropped EXE
PID:4980 -
\??\c:\228000.exec:\228000.exe46⤵
- Executes dropped EXE
PID:1124 -
\??\c:\ttnnhb.exec:\ttnnhb.exe47⤵
- Executes dropped EXE
PID:2240 -
\??\c:\vjddp.exec:\vjddp.exe48⤵
- Executes dropped EXE
PID:1260 -
\??\c:\28444.exec:\28444.exe49⤵
- Executes dropped EXE
PID:3980 -
\??\c:\446060.exec:\446060.exe50⤵
- Executes dropped EXE
PID:900 -
\??\c:\xfrrffx.exec:\xfrrffx.exe51⤵
- Executes dropped EXE
PID:3536 -
\??\c:\6248448.exec:\6248448.exe52⤵
- Executes dropped EXE
PID:3908 -
\??\c:\1nttbn.exec:\1nttbn.exe53⤵
- Executes dropped EXE
PID:3148 -
\??\c:\242028.exec:\242028.exe54⤵
- Executes dropped EXE
PID:952 -
\??\c:\802660.exec:\802660.exe55⤵
- Executes dropped EXE
PID:1452 -
\??\c:\i066482.exec:\i066482.exe56⤵
- Executes dropped EXE
PID:1836 -
\??\c:\bbtnbb.exec:\bbtnbb.exe57⤵
- Executes dropped EXE
PID:2104 -
\??\c:\w40086.exec:\w40086.exe58⤵
- Executes dropped EXE
PID:1472 -
\??\c:\1llfxxx.exec:\1llfxxx.exe59⤵
- Executes dropped EXE
PID:2532 -
\??\c:\22462.exec:\22462.exe60⤵
- Executes dropped EXE
PID:1488 -
\??\c:\26482.exec:\26482.exe61⤵
- Executes dropped EXE
PID:4728 -
\??\c:\0404260.exec:\0404260.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3060 -
\??\c:\rxfrxlr.exec:\rxfrxlr.exe63⤵
- Executes dropped EXE
PID:4944 -
\??\c:\884426.exec:\884426.exe64⤵
- Executes dropped EXE
PID:5088 -
\??\c:\62260.exec:\62260.exe65⤵
- Executes dropped EXE
PID:4972 -
\??\c:\3djjv.exec:\3djjv.exe66⤵
- Executes dropped EXE
PID:2284 -
\??\c:\284260.exec:\284260.exe67⤵PID:3960
-
\??\c:\g6642.exec:\g6642.exe68⤵PID:464
-
\??\c:\3hbhtn.exec:\3hbhtn.exe69⤵PID:5084
-
\??\c:\860648.exec:\860648.exe70⤵PID:5012
-
\??\c:\8862800.exec:\8862800.exe71⤵PID:4036
-
\??\c:\600404.exec:\600404.exe72⤵PID:4872
-
\??\c:\rrlflfl.exec:\rrlflfl.exe73⤵PID:184
-
\??\c:\26242.exec:\26242.exe74⤵PID:440
-
\??\c:\9hthth.exec:\9hthth.exe75⤵PID:2576
-
\??\c:\w46082.exec:\w46082.exe76⤵PID:2264
-
\??\c:\8842888.exec:\8842888.exe77⤵PID:4020
-
\??\c:\444420.exec:\444420.exe78⤵PID:452
-
\??\c:\6626428.exec:\6626428.exe79⤵PID:2268
-
\??\c:\llxrfxl.exec:\llxrfxl.exe80⤵PID:1964
-
\??\c:\24682.exec:\24682.exe81⤵PID:728
-
\??\c:\jjppj.exec:\jjppj.exe82⤵PID:3968
-
\??\c:\842608.exec:\842608.exe83⤵PID:4900
-
\??\c:\hbttth.exec:\hbttth.exe84⤵PID:5008
-
\??\c:\688200.exec:\688200.exe85⤵
- System Location Discovery: System Language Discovery
PID:4236 -
\??\c:\nhhhhh.exec:\nhhhhh.exe86⤵PID:4076
-
\??\c:\rxlxfxr.exec:\rxlxfxr.exe87⤵PID:4832
-
\??\c:\0482042.exec:\0482042.exe88⤵PID:3936
-
\??\c:\088662.exec:\088662.exe89⤵PID:4784
-
\??\c:\frllfll.exec:\frllfll.exe90⤵PID:4216
-
\??\c:\lfrlrll.exec:\lfrlrll.exe91⤵PID:2864
-
\??\c:\2244046.exec:\2244046.exe92⤵PID:3200
-
\??\c:\2628266.exec:\2628266.exe93⤵PID:4940
-
\??\c:\jvjjj.exec:\jvjjj.exe94⤵PID:4968
-
\??\c:\hbnnnb.exec:\hbnnnb.exe95⤵PID:4428
-
\??\c:\xflfxxr.exec:\xflfxxr.exe96⤵PID:4456
-
\??\c:\8028822.exec:\8028822.exe97⤵PID:2456
-
\??\c:\22824.exec:\22824.exe98⤵PID:3804
-
\??\c:\8260408.exec:\8260408.exe99⤵PID:2364
-
\??\c:\m0226.exec:\m0226.exe100⤵PID:1168
-
\??\c:\660604.exec:\660604.exe101⤵PID:1828
-
\??\c:\lxfflrl.exec:\lxfflrl.exe102⤵PID:548
-
\??\c:\02004.exec:\02004.exe103⤵PID:2868
-
\??\c:\xrrfrrl.exec:\xrrfrrl.exe104⤵PID:3528
-
\??\c:\40286.exec:\40286.exe105⤵PID:4336
-
\??\c:\ppjvj.exec:\ppjvj.exe106⤵PID:2476
-
\??\c:\xxxlxrl.exec:\xxxlxrl.exe107⤵PID:4232
-
\??\c:\ttnhbh.exec:\ttnhbh.exe108⤵PID:3020
-
\??\c:\e06640.exec:\e06640.exe109⤵PID:3088
-
\??\c:\a8486.exec:\a8486.exe110⤵PID:2888
-
\??\c:\tnbhbh.exec:\tnbhbh.exe111⤵PID:2104
-
\??\c:\u400448.exec:\u400448.exe112⤵PID:1472
-
\??\c:\k86284.exec:\k86284.exe113⤵PID:1936
-
\??\c:\7vvpd.exec:\7vvpd.exe114⤵PID:3748
-
\??\c:\9rrrrlf.exec:\9rrrrlf.exe115⤵PID:4632
-
\??\c:\dpvjd.exec:\dpvjd.exe116⤵PID:4888
-
\??\c:\24004.exec:\24004.exe117⤵PID:2604
-
\??\c:\46888.exec:\46888.exe118⤵PID:1464
-
\??\c:\m0882.exec:\m0882.exe119⤵PID:4724
-
\??\c:\nhnhtn.exec:\nhnhtn.exe120⤵PID:388
-
\??\c:\04044.exec:\04044.exe121⤵PID:4000
-
\??\c:\46448.exec:\46448.exe122⤵PID:3460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-